Improper Access Control Affecting org.jenkinsci.plugins:octoperf package, versions [,4.5.2)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (31st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Access Control vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGJENKINSCIPLUGINS-3368341
  • published22 Mar 2023
  • disclosed22 Mar 2023
  • creditYaroslav Afenkin, CloudBees, Inc.

Introduced: 22 Mar 2023

CVE-2023-28672  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade org.jenkinsci.plugins:octoperf to version 4.5.2 or higher.

Overview

Affected versions of this package are vulnerable to Improper Access Control due to a missing permission check in a connection test HTTP endpoint.This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.OctoPerf Load Testing Plugin.

CVSS Scores

version 3.1